CVE-2024-26932

7.8 HIGH

📋 TL;DR

This CVE describes a double-free memory corruption vulnerability in the Linux kernel's USB Type-C Power Delivery (PD) subsystem. The flaw occurs when unregistering PD capabilities, allowing attackers with local access to potentially crash the system or execute arbitrary code. It affects Linux systems with USB Type-C PD support enabled.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions containing the vulnerable code (specific versions not provided in CVE, but appears to be around 6.8.0-rc5 and earlier)
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with USB Type-C Power Delivery support enabled/configured. The vulnerability is triggered during PD capability unregistration.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution, potentially leading to complete system compromise.

🟠

Likely Case

Kernel panic or system crash causing denial of service.

🟢

If Mitigated

System remains stable with no impact if patched or if USB Type-C PD is not used.

🌐 Internet-Facing: LOW - Requires local access to the system.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this to crash systems or potentially gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to trigger the double-free condition. Exploitation would require additional steps to achieve code execution beyond just crashing the kernel.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in kernel commits 242e425ed580b2f4dbcb86c8fc03a410a4084a69 and b63f90487bdf93a4223ce7853d14717e9d452856

Vendor Advisory: https://git.kernel.org/stable/c/242e425ed580b2f4dbcb86c8fc03a410a4084a69

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Check with your distribution for specific kernel updates. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Disable USB Type-C PD support

linux

Remove or disable USB Type-C Power Delivery functionality if not needed

echo 'blacklist typec' >> /etc/modprobe.d/blacklist.conf
rmmod typec

🧯 If You Can't Patch

  • Restrict local access to systems to trusted users only
  • Monitor for kernel panic/crash events related to USB Type-C or tcpm modules

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if tcpm/typec modules are loaded: 'lsmod | grep -E "(tcpm|typec)"'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond vulnerable version and check for presence of fix commits in kernel source

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages mentioning tcpm_port_unregister_pd
  • KASAN reports of double-free in tcpm module
  • System crashes during USB Type-C operations

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

event_source="kernel" AND (message CONTAINS "tcpm_port_unregister_pd" OR message CONTAINS "KASAN: double-free" AND module="tcpm")

🔗 References

📤 Share & Export